top of page

VoIPaudit™ is available standalone, or integrated with McAfee® ePolicy Orchestrator®, the industry-leading security and compliance management platform.  

 

VoIPaudit for McAfee® ePolicy Orchestrator® software brings efficient runstate security to the VoIP system by allowing security teams to scan their systems for vulnerabilities, perform queries on the data received, and view easy to read reports.  Security professionals running McAfee ePO software with VoIPaudit can now keep their VoIP network security "top of mind" by ensuring that policy-oriented matters are monitored with the software guiding them through any remediation steps that must be taken.

 

VoIPguard Technology is integrated with the McAfee Network Security Platform (NSP) and VoIPshield is working on completing VoIPguard Technology integration with the McAfee Next Generation Firewall (NGFW).  

VoIPshield is a key technology partner to Intel Security for VoIP security and vulnerability assessments

Why you need to care about VoIP security.

Industry experts agree that VoIP security is a growing concern...

Auditing VoIP Networks to Ensure Compliance Jan, 2015

In this ISACA webinar, Tyson MacAulay, CTO, Intel Security and Peter Davis, Principal, Peter Davis & Associates discuss the importance of an effective strategy for VoIP security.

 

VoIP Security in the news...

From the experts...

October 16, 2015

Long Term Evolution (LTE) mobile networks are currently deployed through the world. These LTE mobile networks make use of full packet switching and the IP protocol, unlike previous iterations of the mobile network. This change from circuit switching to packet switching allows new attacks not previously possible. Some implementations of LTE networks and mobile applications are currently vulnerable to several issues which may result in loss of privacy, incorrect billing, and data spoofing.

October 6, 2015

VoIPshield Systems Inc. has teamed up with Intel Security to deliver comprehensive solutions for Voice over Internet Protocol (VoIP) security. The announcement comes on the heels of new research that shows Internet telephony networks are a major attack vector for cyber hackers

July 24, 2015

A strategically placed firewall within your network infrastructure can help mitigate VoIP attacks. But encryption and proxy services add enhanced security. Companies have long used firewall appliances to protect and isolate their networks from internal and external security threats. And ever since Voice over IP (VoIP) emerged on the global market, security vendors have expanded their products and services to meet its demands. While attacks are more sophisticated in exploiting any weakness in a VoIP system,firewalls have progressed and become smarter in defending against VoIP attacks.

July 9, 2015

As more consumers and organizations continue to migrate from their landline to IP telephony, hackers are targeting this platform because of the sheer number of gateways that could be exploited. With VoIP, the security threat not only includes the same problems data networks face, but also issues that are specific to IP telephony. Unlike TDM phones and PBXs which had very few security issues because they are hard-wired, VoIP caller server gateways and IP phones are software based, which makes it much easier to access. Therefore protecting the infrastructure with a layered security approach is better to mitigate VoIP attacks.

June 23, 2015

Last week's cyberattack on federal government websites is raising concerns about the government's plan to switch many of its landlines over to Voice over Internet Protocol (VoIP) phones.

June 10, 2015

Voice over IP (VoIP) infrastructure has become more susceptible to cyber attacks in recent years due to the proliferation of both its use and the tools that can be used for malicious purposes. During the first quarter of 2015, our security researchers have observed a large amount of VoIP attacks worldwide; however, the majority were against UK servers.

June 8, 2015

I write about VoIP security from time to time, and it’s a prime topic for this column in a few different ways. While VoIP security is of particular relevance to TMC’s (News - Alert) audience, it’s really a small branch of the data security tree, which encompasses many strands of traffic that IT must manage over their network.

May 18, 2015

In my last post, I wrote about a current success story from a particular vendor, as it was a great example of how to work with a customer experiencing VoIP security problems and to implement an effective solution. Generally, I try to stay vendor-neutral, so I’m going to continue this topic along those lines. There are several realities related to VoIP security that don’t get attention, and SMBs in particular need to understand them. More importantly, however, they need to respond proactively, and that likely requires a change in thinking.

May 14, 2015

In my last post, I framed the VoIP security analysis around two misperceptions that allow this to become a serious issue. As a technology, VoIP is inherently not secure – it was created before broadband at a time when the hacking threats we see today did not exist. Furthermore, VoIP was outside the mainstream back then and very much built in the Internet spirit of openness and sharing. The creators were really only thinking about how VoIP would be used for good purposes rather than serving as a vehicle for cyber attackers.

May 14, 2015

In my last post, I framed the VoIP security analysis around two misperceptions that allow this to become a serious issue. As a technology, VoIP is inherently not secure – it was created before broadband at a time when the hacking threats we see today did not exist. Furthermore, VoIP was outside the mainstream back then and very much built in the Internet spirit of openness and sharing. The creators were really only thinking about how VoIP would be used for good purposes rather than serving as a vehicle for cyber attackers.

May 11, 2015

Network security should always be a concern with any type of communications, especially when using Session Initiation Protocol (SIP). There are special security considerations associated with SIP trunking you should be aware of to maintain safe communications, including the threat of a brute force attack or Denial of Service (DoS) attack. Here’s what you need to know to reduce the odds of your communications becoming compromised.

Please reload

bottom of page